Publicații

2018:

  1. A. Pauna, A.C. Iacob, and I. Bica, “QRASSH – A self-adaptive SSH Honeypot driven by Q-Learning,” in Proceedings of the 2018 International Conference on Communications (COMM), Bucharest, Romania, 2018, pp. 441 – 446, DOI: 10.1109/ICComm.2018.8484261;
  2. C. Grumăzescu, V.A. Vlăduta and A. Timofte, “Hybrid identity based cryptographic scheme optimization using machine learning in WSN,” in Proceedings of the 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Iasi, Romania, 2018;
  3. I. Aciobăniței, R.Ioana. Guinea and M.L. Pura, “AVISPA versus AVANTSSAR in the Model Checking of Secure Communication Protocols,” in Proceedings of the 15th International Joint Conference on e-Business and Telecommunications – Volume 1: SECRYPT, Porto, Portugal, 2018, pp. 520-525, ISBN: 978-989-758-319-3; DOI: 10.5220/0006887906860691
  4. I. Aciobăniței, I. C. Buhuș and M.L. Pura, “Using Cryptography in the Cloud for Lightweight Authentication Protocols Based on QR Codes,” in Proceedings of the 2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI), Timisoara, Romania, 2018, pp. 539 – 542, DOI: 10.1109/SACI.2018.8440949;
  5. I. Aciobăniței, I. C. Buhuș and M.L. Pura, “Lightweight version of SQRL authentication protocol based on cryptography in the cloud,” in Proceedings of the 2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI), Timisoara, Romania, 2018, pp. 173 -178, DOI: 10.1109/SACI.2018.8440957;
  6. F. Stancu, D. C. Trancă, M. Chiroiu and R. Rughiniș, “Evaluation of cryptographic primitives on modern microcontroller platforms,” in Proceedings of the 2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet), Cluj-Napoca, Romania, 2018, pp. 1-6, DOI: 10.1109/ROEDUNET.2018.8514127;
  7. A. Bican, R. Deaconescu, W. N. Chin and Q.T. Ta, “Verification of C Buffer Overflows in C Programs,” in Proceedings of the 2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet), Cluj-Napoca, Romania, 2018, pp. 1-6, DOI: 10.1109/ROEDUNET.2018.8514126;
  8. V. Velciu, F. Stancu and M. Chiroiu, “HiddenApp – Securing Linux applications using ARM TrustZone,” Innovative Security Solutions for Information Technology and Communications, Lecture Notes in Computer Science, Springer, 2019 (acceptat spre publicare);
  9. D. Sporici, M. Chiroiu and D. Ciocîrlan, “An Evaluation of OCR Systems against Adversarial Machine Learning”, Innovative Security Solutions for Information Technology and Communications, Lecture Notes in Computer Science, Springer, 2019 (acceptat spre publicare);
  10. C. Toma, B. Talpiga, C. Boja, M. Popa, B. Iancu and M. Zurini, “Secure IoT Supply Chain Management Solution using Blockchain and Smart Contracts Technology”, Innovative Security Solutions for Information Technology and Communications, Lecture Notes in Computer Science, Springer, 2019 (acceptat spre publicare);
  11. C. Toma and M. Popa, “IoT security issues for Industry 4.0 – Oil & Gas Solution,” in Proceedings of the 17th International Conference on Informatics in Economy (IE 2018) Education, Research & Business Technologies, Iasi, Romania, 2018, pp. 113 – 118, ISSN 2284-7472;
  12. C. Boja and M. Zurini, “IoT security architecture based on device fingerprinting,” in Proceedings of the 17th International Conference on Informatics in Economy (IE 2018) Education, Research & Business Technologies, Iasi, Romania, 2018, pp. 157 – 162, ISSN 2284-7472;
  13. C. Paduraru, M.C. Melemciuc, “An automatic test data generation tool using machine learning,” in Proceedings of the 13th International Conference on Software Technologies – Volume 1: ICSOFT, Porto, Portugal, 2018, pp. 472-481, ISBN 978-989-758-320-9, DOI: 10.5220/0006836605060515;
  14. G. Ducoffe, “A new application of Orthogonal Range Searching for computing Giant Graph Diameters,” in Proceedings of 2nd Symposium on Simplicity in Algorithms (SOSA’19), San Diego, SUA, 2019 (acceptat spre publicare);
  15. C. Toma and M. Popa, “IoT Security Approaches in Oil & Gas Solution Industry 4.0”, Informatica Economică vol. 22, no. 3/2018, pp. 46 – 62, DOI: 10.12948/issn14531305/22.3.2018.05.

2019:

  1. A. Pauna, I. Bica, F. Pop, and A. Castiglione, “On the rewards of self-adaptive IoT honeypots,” Annals of Telecommunications, vol. 74, no. 7–8, pp. 501–515, Jan. 2019, DOI: 10.1007/s12243-018-0695-7;
  2. B.-C. Chifor, S.-C. Arseni, I. Matei, and I. Bica, “Security-Oriented Framework for Internet of Things Smart-Home Applications,” 2019 22nd International Conference on Control Systems and Computer Science (CSCS), May 2019, DOI: 10.1109/CSCS.2019.00033;
  3. V.-A. Vladuta, I. Matei, and I. Bica, “Data Gathering Optimization in Wireless Sensor Networks Using Unmanned Aerial Vehicles,” 2019 22nd International Conference on Control Systems and Computer Science (CSCS), May 2019, DOI: 10.1109/CSCS.2019.00029;
  4. V.-A. Vladuta, I. Bica, and V.-V. Patriciu, “Energy Efficient Trust-based Security Mechanism for Wireless Sensors and Unmanned Aerial Vehicle,” 2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Pitești, Romania, June 2019;
  5. I. Bica, B.-C. Chifor,  Ș-C. Arseni, and I. Matei, “Multi-Layer IoT Security Framework for Ambient Intelligence Environments,” Sensors, vol. 19, no. 18, p. 4038, Sep. 2019, DOI: 10.3390/s19184038;
  6. I. Bica, B.-C. Chifor,  Ștefan-C. Arseni, and I. Matei, “Reputation-based Security Framework for Internet of Things,” Innovative Security Solutions for Information Technology and Communications, Lecture Notes in Computer Science, Springer (acceptat spre publicare);
  7. I. Aciobanitei, P.-D. Urian, and M.-L. Pura, “Learned Lessons from Implementing an Android Client for the Cloud Signature Consortium API,” Innovative Security Solutions for Information Technology and Communications, Lecture Notes in Computer Science, Springer (acceptat spre publicare);
  8. A. Cosma, I.E. Radoi, and V. Radu, “CamLoc: Pedestrian Location Estimation through Body Pose Estimation on Smart Cameras,” 2019 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Pisa, Italy, Sep. 2019;
  9. I.E. Radoi, D. Cirimpei, and V. Radu, “Localization Systems Repository: A Platform for Open-source Localization Systems and Datasets,” 2019 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Pisa, Italy, Sep. 2019;
  10. V. Pelin, and I.E. Radoi, “PXNOR: Perturbative Binary Neural Network,” 2019 18th RoEduNet Conference: Networking in Education and Research (RoEduNet), Galati, Romania, Oct. 2019;
  11. V.-A. Stefanescu, I.E. Radoi, “Stress Level Prediction Using Data From Wearables,” 2019 18th RoEduNet Conference: Networking in Education and Research (RoEduNet), Galati, Romania, Oct. 2019;
  12. F.-A. Stancu, D.C. Trancă, and M. Chiroiu, “TIO – Secure Input/Output for Intel SGX Enclaves,” 2019 International Workshop on Secure Internet of Things (SIoT 2019), Luxembourg, Sept. 2019;
  13. R.-A. Mantu, D. Sporici, M. Chiroiu, “Control Flow Integrity Based on Controlled Channel,” 2019 22nd International Conference on Control Systems and Computer Science (CSCS), Bucharest, May 2019;
  14. A.-I. Pandelea, and M. Chiroiu, “Password Guessing Using Machine Learning on Wearables,” 2019 22nd International Conference on Control Systems and Computer Science (CSCS), May 2019;
  15. A. Zamfiroiu, B. Iancu, C. Boja, T.-M. Georgescu, and C. Cartas, “IoT Architectures for Critical Infrastructures Protection,” 18th European Conference on Cyber Warfare and Security (ECCWS), Coimbra, Portugal, July 2019;
  16. A. Zamfiroiu, P. Pocatilu, and S. Capisizu, “Mobile Data Vulnerabilities,” Proceedings of the 18th International Conference on Informatics in Economy Education, Research and Business Technologies, Bucharest, Romania, May 2019, DOI: 10.12948/ie2019.06.10;
  17. C. Toma, M. Popa, M. Doinea, and B. Iancu, “Voting Dapp In Embedded Devices Using Blockchain Technology And Security Challenges,” Proceedings of the 18th International Conference on Informatics in Economy Education, Research and Business Technologies, Bucharest, Romania, May 2019, DOI: 10.12948/ie2019.06.11;
  18. C. Boja, C. Cartas, M. Zurini, “Web-based ad-hoc architecture for data processing in a decentralized Internet,” Proceedings of the 18th International Conference on Informatics in Economy Education, Research and Business Technologies, Bucharest, Romania, May 2019, DOI: 10.12948/ie2019.06.14;
  19. C. Toma, A. Alexandru, M. Popa, and A. Zamfiroiu, “IoT Solution for Smart Cities’ Pollution Monitoring and the Security Challenges,” Sensors, vol. 19, no. 15, p. 3401, Aug. 2019, DOI: 10.3390/s19153401;
  20. T.-M. Georgescu, B. Iancu, and M. Zurini, “Named-Entity-Recognition-Based Automated System for Diagnosing Cybersecurity Situations in IoT Networks,” Sensors, vol. 19, no. 15, p. 3380, Aug. 2019, DOI: 10.3390/s19153380;
  21. F. Stoican, and P. Irofti, “Aiding Dictionary Learning through Multi-Parametric Sparse Representation,” Algorithms, vol. 12, no. 7, pp. 131-149, Jun. 2019, DOI: 10.3390/a12070131;
  22. P. Irofti, and B. Dumitrescu, “Pairwise Approximate K-SVD,” ICASSP 2019 – 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), May 2019, DOI: 10.1109/ICASSP.2019.8683788;
  23. P. Irofti and A. Băltoiu, “Malware Identification with Dictionary Learning,” 2019 27th European Signal Processing Conference (EUSIPCO), Sep. 2019;
  24. G. Ducoffe, “Faster approximation algorithms for computing shortest cycles on weighted graphs,” International Colloquium on Automata, Languages and Programming (ICALP’19), Leibniz International Proceedings in Informatics (LIPIcs), vol. 132, pp. 49:1-49:13, 2019, DOI: 10.4230/LIPIcs.ICALP.2019.49;
  25. G. Ducoffe, “The 4-Steiner Root Problem,” International Workshop on Graph Theoretic Concepts in Computer Science (WG’19), Vall de Nuria, Spain. Lecture Notes in Computer Science, vol 11789, 2019, DOI: 10.1007/978-3-030-30786-8_2;
  26. C. Paduraru and M. Paduraru, “Automatic Difficulty Management and Testing in Games using a Framework Based on Behavior Trees and Genetic Algorithms,” 2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS), Nov. 2019, DOI: 10.1109/ICECCS.2019.00026;
  27. C. Paduraru, M.-C. Melemciuc, and B. Ghimis, “Fuzz Testing with Dynamic Taint Analysis based Tools for Faster Code Coverage,” Proceedings of the 14th International Conference on Software Technologies, 2019, DOI: 10.5220/0007921300820093;
  28. R. F. Olimid, “SecRet: How to Apply the 5E Model for a Master’s Level Network Security Course,” IEEE Communications Magazine, vol. 57, no. 11, pp. 54–59, Nov. 2019, DOI: 10.1109/MCOM.001.1900228;
  29. A. Baltoiu and B. Dumitrescu, “Size Adaptation of Separable Dictionary Learning with Information-Theoretic Criteria,” 2019 22nd International Conference on Control Systems and Computer Science (CSCS), May 2019, DOI: 10.1109/CSCS.2019.00009;
  30. A. Panait, R. Olimid, and A. Stefanescu, “Identity management on blockchain – privacy and security aspects”, Romanian Cryptology Days Conference 2019, pp.1-8, to appear in Proceedings of the Romanian Academy Series A – Mathematics Physics Technical Sciences Information Science, 2019;
  31. C. Paduraru, M.-C. Melemciuc, and M. Paduraru, “Automatic Test Data Generation for a Given Set of Applications Using Recurrent Neural Networks,” Software Technologies, pp. 307–326, 2019, DOI: 10.1007/978-3-030-29157-0_14;
  32. C. Paduraru, B. Ghimis, and M. Paduraru, “Implementation of Publisher-Subscriber paradigm using Virtual Organisms”, 21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), 2019.

2020:

  1. C. Lupascu, A. Lupascu, and I. Bica, “DLT Based Authentication Framework for Industrial IoT Devices,” Sensors, vol. 20, no. 9, p. 2621, May 2020;
  2. I. Aciobanitei, I. Luculescu, and M.-L. Pura, “Qualified Electronic Signature SaaS Solution for Google Docs & Google Sheets Documents,” 2020 13th International Conference on Communications (COMM), Jun. 2020;
  3. I. Aciobanitei, V. Dedita, M.-L. Pura, and V.-V. Patriciu, “SABRES – A Proof of Concept for Enhanced Cloud Qualified Electronic Signatures,” 2020 13th International Conference on Communications (COMM), Jun. 2020;
  4. L. Deshotels, C. Carabas, J. Beichler, R. Deaconescu, and W. Enck, “Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS,” 2020 IEEE Symposium on Security and Privacy (SP), May 2020;
  5. E.-C. Ruica, M.-L. Pura, and I. Aciobanitei, “Implementing Cloud Qualified Electronic Signatures for Documents using Available Cryptographic Libraries: A Survey,” 2020 13th International Conference on Communications (COMM), Jun. 2020;
  6. T.-M. Georgescu, B. Iancu, A. Zamfiroiu, M. Doinea, C. E. Boja, and C. Cartas, “A Survey on Named Entity Recognition Solutions Applied for Cybersecurity-Related Text Processing,” Advances in Intelligent Systems and Computing, pp. 316–325, Oct. 2020;
  7. C. Toma, M. Popa, M. Doinea, “A.I. neural networks inference into the IoT embedded devices using TinyML for pattern detection within a security system,” Proceedings of the IE 2020 International Conference, May 2020;
  8. A. Zamfiroiu, B. Iancu, C. Boja, T.-M. Georgescu, C. Cartas, M. Popa, and C. V. Toma, “IoT Communication Security Issues for Companies: Challenges, Protocols and The Web of Data,” Proceedings of the International Conference on Business Excellence, vol. 14, no. 1, pp. 1109–1120, Jul. 2020;
  9. T.-M. Georgescu, “Natural Language Processing Model for Automatic Analysis of Cybersecurity-Related Documents,” Symmetry, vol. 12, no. 3, p. 354, Mar. 2020;
  10. C. Paduraru, M. Paduraru, and A. Stefanescu, “Optimizing decision making in concolic execution using reinforcement learning,” 2020 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Oct. 2020;
  11. M. Cernat, A.-N. Staicu, and A. Stefanescu, “Towards Automated Testing of RPA Implementations”, In Proc. of A-TEST’20, workshop affiliated to ESEC/FSE’20, pp. 21-24, ACM, 2020;
  12. A. Pătraşcu, C. Păduraru, and P. Irofti, “Stochastic SPG with Minibatches,” Studies in Computational Intelligence, pp. 3–25, Sep. 2020;
  13. C. I. Paduraru and G. Stefanescu, “Adaptive Virtual Organisms: A Compositional Model for Complex Hardware-software Binding”, Fundamenta Informaticae, vol. 173, no. 2–3, pp. 139–176, Mar. 2020;
  14. C. Paduraru, B. Ghimis, and A. Stefanescu, “RiverConc: An Open-source Concolic Execution Engine for x86 Binaries,” Proceedings of the 15th International Conference on Software Technologies, 2020;
  15. M. Cernat, A.-N. Staicu, and A. Stefanescu, “Improving UI Test Automation using Robotic Process Automation,” Proceedings of the 15th International Conference on Software Technologies, 2020;
  16. P. Irofti, and A. Băltoiu, “Unsupervised dictionary learning for anomaly detection,” To appear in Proc. of iTWIST’20 (international Traveling Workshop on Interactions between low-complexity data models and Sensing Techniques), 2020;
  17. A. Băltoiu, A. Pătrașcu, and P. Irofti, “Graph Anomaly Detection Using Dictionary Learning,” To appear in The 21st World Congress of the International Federation of Automatic Control, 2020, pp. 1-8;
  18. C. Paduraru, A. Stefanescu, and B. Ghimis, “Testing Multi-tenant Applications using Fuzzing and Reinforcement Learning“. In Proc. of LANGETI’20, workshop affiliated to ESEC/FSE’20, pp. 1-6, ACM, 2020;
  19. B. Ghimis, M. Paduraru, and A. Stefanescu,  ”RIVER 2.0: An Open-Source Testing Framework using AI Techniques,”; In Proc. of LANGETI’20, workshop affiliated to ESEC/FSE’20, pp. 13-18, ACM, 2020;
  20. A.-E. Panait, R. F. Olimid, and A. Stefanescu, ”Identity Management on Blockchain – Privacy and Security Aspects”, Proceedings of the Romanian Academy, Series A, Volume 21, Number 1/2020, pp. 45-52, 2020;
  21. A.-E. Panait, R. F. Olimid, and A. Stefanescu, “Analysis of uPort Open, an Identity Management Blockchain-Based Solution,” Lecture Notes in Computer Science, pp. 3–13, 2020.

2021:

  1. S-C. Arseni, B.-C. Chifor, M. Coca, M. Medvei, I. Bica, and I. Matei, “RESFIT: A Reputation and Security Monitoring Platform for IoT Applications,” Electronics, vol. 10, no. 15, p. 1840, Jul. 2021 (Revista ISI, IF/2020: 2,397);
  2. I. Apostol, M. Preda, C. Nila, and I. Bica, “IoT Botnet Anomaly Detection Using Unsupervised Deep Learning,” Electronics, vol. 10, no. 16, p. 1876, Aug. 2021 (Revista ISI, IF/2020: 2,397);
  3. I. Bica, R. L. Unc, and  S. Turcanu, “Virtualization and Automation for Cybersecurity Training and Experimentation,”  Innovative Security Solutions for Information Technology and Communications, Lecture Notes in Computer Science, Vol. 12596, pp. 227–241, Springer, 2021 (Conferință BDI: Scopus);
  4. C. Toma, M. Popa, M Doinea, “Cloud Authentication using FIDO compliant Java Card Technology Secure Elements”, The 20th International Conference on Informatics in Economy, Bucharest, Romania, 2021 (Conferință ISI);
  5. R. Deaconescu, T. Georgescu, A. Bălțoiu, A. Puncioiu, “Using cybersecurity exercises as essential learning tools in universities,” The 14th International Conference on Computer Supported Education, Prague, 2022 (sub evaluare).